The knowledge of finding out the identity of a distinct entity
based on the physical, behavioral or chemical characteristics of a person is
called Biometrics. It originates from two words bios (means life)
and metron (means measure).
The biometrics is mostly used for employing the identity management in
wide-ranging situations in which precise individual identification is
fundamental.
Some of the biometric applications are employed in situations
where the networks are being shared between the users, in electronically
business deals (such as e-shopping and ATM stations) and in any other
commercial transactions.
The identity identification may be essential for a variety of
factors though the major goal, in most programs, will be to avert invaders from
penetrating to the covered property. Three ways of creating a person’s identity
comprise the following mechanism.
Most email messages are sent without any additional message
encryption. The sender will send a message through internet via Sender's SMTP
server which will be later passed to the recipient via recipient's POP/IMAP
server. Although encryption is not added, the opportunity of identity spoofing,
unauthorized message modification or interception is still possible.
Once a sender wants to send an encrypted message to an intended
recipient, the sender should recognize whether the recipient has the reliable
decryption tools or not; after that, he will get his public key corresponding to his private key Then, sender should load recipient's
public key in the mail client and
produce his own private/public key pairs for
signing purpose. Finally, signed text will
be encrypted by recipient's public key to
form cipher text to be sent to
the recipient. The recipient will decrypt the received message by his private
key and verify sender's signature by his verification tool and sender's public
key to reveal the message.
No comments:
Post a Comment